LightBeam Documentation
Installer GuidesData SourcesPlaybooksInsightsPrivacyOpsGovernance
  • ๐Ÿ’กWhat is LightBeam?
  • ๐Ÿš€Getting Started
    • โš™๏ธInstaller Guides
      • Pre-Requisites / Security Configurations
        • Firewall Requirements
        • Securing LightBeam on EKS with AWS Certificate Manager on Elastic Load Balancer
        • Configure HTTPS for LightBeam Endpoint FQDN Standalone deployment
        • Using Custom Certificates with LightBeam
        • Securing LightBeam on GKE with Google Certificate Manager and GCE Ingress
      • Core
        • LightBeam Deployment Instructions
        • LightBeam Installer
        • Web App Deployment
        • LightBeam Diagnostics
        • LightBeam Cluster Backup & Restore using Velero
      • Platform Specific
        • AWS
        • Microsoft Azure
        • Google Cloud (GKE)
        • Standalone Virtual Machine
        • Deployment on an Existing Managed Kubernetes Cluster
        • Azure Marketplace Deployment
      • Integration and Setup
        • Setting Up AWS PrivateLink for RDS-EKS Interaction
        • Twingate and LightBeam Integration Guide
        • Data Subject Request Web Application Server
        • Generate CSR for LightBeam
  • ๐Ÿง Core Features
    • ๐Ÿ”ฆSpectra AI
      • ๐Ÿ”—Data Sources
        • Cloud Platforms
          • AWS Auto Discovery
          • GCP Auto Discovery
        • Databases and Datalakes
          • PostgreSQL
          • Aurora (PostgreSQL)
          • Snowflake
          • MS SQL
          • MySQL
          • Aurora (MySQL)
          • BigQuery
          • AWS Redshift
          • Oracle
          • DynamoDB
          • MongoDB
          • CosmosDB (PostgreSQL)
          • CosmosDB (MongoDB)
          • CosmosDB (NoSQL)
          • Looker
          • AWS Glue
          • Databricks
          • SAP HANA
          • CSV Files as a Datasource
        • Messaging
          • Gmail
          • Slack
          • MS Teams
          • MS Outlook
        • Developer Tools
          • Zendesk
          • ServiceNow
          • Jira
          • GitHub
          • Confluence
        • File Repositories
          • NetDocuments
          • AWS S3
          • Azure Blob
          • Google Drive
          • OneDrive
          • SharePoint
          • Viva Engage
          • Dropbox
          • Box
          • SMB
        • CRM
          • Hubspot
          • Salesforce
          • Automated Data Processing (ADP)
          • Marketo
          • Iterable
          • MS Dynamics 365 Sales
          • Salesforce Marketing Cloud
      • ๐Ÿ””PlayBooks
        • What is LightBeam Playbooks?
        • Policy and Alerts
          • Types of Policies
          • How to create a rule set
            • File Extension Filter
          • Configuring Retention Policies
          • Viewing Alerts
          • Sub Alerts
            • Reassigning Sub-Alerts
            • Sub-alert States
          • Levels of Actions on Alerts
          • User Roles and Permissions
            • Admin View
            • Alert Owner View
            • Onboarding New Users
              • User Management
              • Okta Integration
              • Alert Assignment Settings
              • Email Notifications
            • Planned Enhancements
          • Audit Logs
          • No Scan List
          • Permit List
          • Policy in read-only mode
      • ๐Ÿ“ŠInsights
        • Entity Workflow
        • Document Classification
        • Attribute Management Overview
          • Attributes Page View
          • Attribute Sets
          • Creating Custom Attribute
          • Attributes List
        • Template Builder
        • Label Management
          • MIP Integration
          • Google Labels Integration
      • ๐Ÿ—ƒ๏ธReporting
        • Delta Reporting
        • Executive Report
        • LightBeam Lens
      • Scanning and Redaction of Files
        • On-demand scanning
      • How-to Guides
        • Leveraging LightBeam insights for structured data sources
      • LightBeam Dashboard Outlay
      • Risk Score
    • ๐Ÿ›๏ธPrivacyOps
      • Data Subject Request (DSR)
        • What is DSR?
        • Accessing the DSR Module
        • DSR Form Builder (DPO View)
          • Creating a New DSR Form
            • Using a Predefined Template
            • Creating a Custom Form
          • Form Configuration
          • Form Preview and Publishing
          • Multi-Form Management
          • Messaging Templates
        • Form Submission & Email Verification (Data Subject View)
        • DSR Management Dashboard (DPO View)
        • Processing DSR Requests
          • Data Protection Officer (DPO) Workflow
          • Self Service Workflow (Direct Validation)
          • Data Source Owner (DSO) Workflow
        • DSR Report
      • ๐ŸšงConsent Management
        • Overview
        • Consent Logs
        • Preference Centre
        • Settings
      • ๐ŸชCookie Consent
        • Dashboard
        • Banners
        • Domains
        • Settings
        • CMP Deployment Guide for Google Tag Manager
        • FAQs
      • ๐Ÿ”Privacy Impact Assessment (PIA)
        • PIA Templates
        • PIA Assessment Workflow
        • Collaborator View
        • Process Owner Login View (With Collaborator)
        • Filling questionnaire without collaborator
        • Submitting the assessment for DPO review
        • DPO review process
        • Marking the assessment as reviewed
        • Editing and resubmitting assessments after DPO review
        • Revoke review request
        • Edit Reviewer
        • PIA Reports
      • โบ๏ธRecords of Processing Activity (RoPA)
        • Creating a RoPA Template
          • How to clone a template
          • How to use a template
        • How to create a process
          • Adding Process Details
          • Adding Data Elements
          • Adding Data Subjects
          • Adding Data Retention
          • Adding Safeguards
          • Adding Transfers
          • Adding a Custom Section
          • Setting a Review Schedule
          • Data Flow Diagram
        • How to add a collaborator
        • Overview Section
        • Generating a RoPA Report Using LightBeam
        • Collaborator working on a ticket
    • ๐Ÿ›ก๏ธGovernance
      • Access
        • Dashboard
        • Users
        • Groups
        • Objects
        • Active Directory Settings
        • Access Governance at a Data Source Level
        • Policies and Alerting
        • Access Governance Statistics
        • Governance Module Dashboard
      • Privacy At Partners
  • ๐Ÿ“ŠTools & Resources
    • ๐Ÿ”€API Documentation
      • API to Create Reports for Structured Datasource
    • โ“Onboarding Assessments
      • Structured Datasource Onboarding Questionnaire
        • MongoDB/CosmosDB Questionnaire
        • Oracle Datasource Questionnaire
      • SMB Questionnaire
    • ๐Ÿ› ๏ธAdministration
      • Audit Logs
      • SMTP
        • Basic and oAuth Configuration
      • User Management
        • SAML Identity Providers
          • Okta
            • LightBeam Okta SAML Configuration Guide
          • Azure
            • Azure AD SAML Configuration for LightBeam
          • Google
            • Google IDP
        • Local User Management
          • Adding a User to the LightBeam Dashboard
          • Reset Default Admin Password
  • ๐Ÿ“šSupport & Reference
    • ๐Ÿ“…Release Notes
      • LightBeam v2.2.0
      • Reporting Release Notes
      • Q1 2024 Key Enhancements
      • Q2 2024 Key Enhancements
      • Q3 2024 Key Enhancements
      • Q4 2024 Key Enhancements
    • ๐Ÿ“–Glossary
Powered by GitBook
On this page
  • Overview:
  • Configuration Steps
  • About LightBeam
  1. Getting Started
  2. Installer Guides
  3. Integration and Setup

Setting Up AWS PrivateLink for RDS-EKS Interaction


Overview:

This guide provides a walkthrough for configuring AWS PrivateLink to facilitate secure, private communication between an RDS (Amazon Relational Database Service) instance and an EKS (Amazon Elastic Kubernetes Service) cluster located in different regions. AWS PrivateLink allows for this interaction without the need for VPC peering, provided both services reside within the same AWS account.

The process involves creating two VPC (Virtual Private Cloud) endpoints: one in the RDS instance's region and another in the EKS cluster's region. These endpoints serve as intermediaries, enabling private connectivity between the RDS and EKS services.

While VPC peering isn't necessary for cross-region connectivity within the same AWS account, it becomes essential when the RDS and EKS are in different AWS accounts. Additionally, regardless of the account setup, a valid peering or VPN connection between the VPCs is crucial to ensure seamless traffic flow between the endpoints across different regions.


Configuration Steps

Using AWS Console

To establish a private link between different VPCs for accessing resources such as an EKS cluster and an RDS instance via the AWS Management Console, follow these steps:

  1. Open the AWS Management Console and navigate to the VPC Dashboard. Select the VPC where the EKS cluster is operational.

  2. Click on "Endpoints" in the left-hand menu, then click "Create Endpoint".

  3. From the list of available services, select the service name for EKS and choose "Interface" for the endpoint type.

  4. Select the VPC and the subnet where you wish to create the endpoint.

  5. Choose the security group to associate with the endpoint. You can either create a new security group or select an existing one.

  6. Review the configuration and click "Create Endpoint" to establish the VPC endpoint for EKS.

  7. Repeat steps 2-6 for the VPC where the RDS instance is operational, selecting the RDS service name instead of EKS.

  8. After creating both VPC endpoints, navigate to the route tables of each VPC and add a route for the CIDR block of the service to the VPC endpoint ID.

  9. In the security group for the EKS cluster, permit inbound traffic from the security group associated with the VPC endpoint for the RDS instance.

  10. In the security group for the RDS instance, permit inbound traffic from the security group associated with the VPC endpoint for the EKS cluster.

  11. Test the connection by connecting to the EKS cluster from one of the pods running on the EKS cluster and RDS instance using their private IP addresses.

Note: Ensure the correct subnet and security group are selected for each endpoint when creating the VPC endpoints. Also, ensure the correct CIDR block and VPC endpoint ID are used when adding the routes to the route tables. In steps 9 and 10, select the correct security groups for the EKS cluster and RDS instance respectively.

Using AWS CLI

The aforementioned steps can also be executed using the AWS Command Line Interface (CLI). Here's how:

  1. Create a VPC endpoint in the VPC where the EKS cluster is operational:

aws ec2 create-vpc-endpoint --vpc-id <vpc-id-of-EKS-cluster> --service-name com.amazonaws.<region>.eks --vpc-endpoint-type Interface --subnet-ids <subnet-id>
  1. Create a VPC endpoint in the VPC where the RDS instance is operational:

aws ec2 create-vpc-endpoint --vpc-id <vpc-id-of-RDS-instance> --service-name com.amazonaws.<region>.rds --vpc-endpoint-type Interface --subnet-ids <subnet-id>
  1. Modify the route tables in each VPC to direct traffic to the VPC endpoints:

aws ec2 create-route --route-table-id <route-table-id> --destination-cidr-block <service-ip> --vpc-endpoint-id <vpc-endpoint-id>
  1. Create a security group for the EKS cluster:

aws ec2 create-security-group --group-name eks-sg --description "EKS security group" --vpc-id <vpc-id-of-EKS-cluster>
  1. Authorize traffic from the VPC endpoint in the security group for the EKS cluster:

aws ec2 authorize-security-group-ingress --group-id <eks-security-group-id> --protocol tcp --port <port> --source-group <security-group-id-of-VPC-endpoint>
  1. Modify the RDS instance to allow traffic from the security group of the VPC endpoint:

aws rds modify-db-instance --db-instance-identifier <db-instance-identifier> --vpc-security-group-ids <security-group-id-of-VPC-endpoint>
  1. Verify the connection:

Ensure that you can access the EKS cluster and RDS instance using the private IP addresses of the VPC endpoints.

Note: In steps 1 and 2, you'll need to specify the subnet ID of the subnet where you wish to create the VPC endpoint. In step 3, repeat the create-route command for each VPC endpoint and route table. Lastly, in step 5, replace <port> with the port number that the EKS cluster uses to communicate with the RDS instance.


About LightBeam

LightBeam automates Privacy, Security, and AI Governance, so businesses can accelerate their growth in new markets. Leveraging generative AI, LightBeam has rapidly gained customersโ€™ trust by pioneering a unique privacy-centric and automation-first approach to security. Unlike siloed solutions, LightBeam ties together sensitive data cataloging, control, and compliance across structured and unstructured data applications providing 360-visibility, redaction, self-service DSRs, and automated ROPA reporting ensuring ultimate protection against ransomware and accidental exposures while meeting data privacy obligations efficiently. LightBeam is on a mission to create a secure privacy-first world helping customers automate compliance against a patchwork of existing and emerging regulations.

PreviousIntegration and SetupNextTwingate and LightBeam Integration Guide

Last updated 1 year ago

For any questions or suggestions, please get in touch with us at: .

๐Ÿš€
โš™๏ธ
support@lightbeam.ai